• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.034 seconds

A Study on Development and Application of Real Time Vision Algorithm for Inspection Process Automation (검사공정 자동화를 위한 실시간 비전알고리즘 개발 및 응용에 관한 연구)

  • Back, Seung-Hak;Hwang, Won-Jun;Shin, Haeng-Bong;Choi, Young-Sik;Park, Dae-Yeong
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.19 no.1
    • /
    • pp.42-49
    • /
    • 2016
  • This study proposes a non-contact inspective technology based robot vision system for Faulty Inspection of welding States and Parts Shape. The maine focus is real time implementation of the machining parts' automatic inspection by the robotic moving. For this purpose, the automatic test instrument inspects the precision components designator the vision system. pattern Recognition Technologies and Precision Components for vision inspection technology and precision machining of precision parts including the status and appearance distinguish between good and bad. To perform a realization of a real-time automation integration system for the precision parts of manufacturing process, it is designed a robot vision system for the integrated system controller and verified the reliability through experiments. The main contents of this paper, the robot vision technology for noncontact inspection of precision components and machinery parts is useful technology for FA.

A Study on Kinematics Modeling and Motion Control Algorithm Development in Joint for Vertical Type Articulated Robot Arma (수직다관절형 아암의 운동학적 모델링 및 관절공간 모션제어에 관한 연구)

  • Jo, Sang-Young;Kim, Min-Seong;Yang, Jun-Seok;Won, Jong-Beom;Han, Sung-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.19 no.1
    • /
    • pp.18-30
    • /
    • 2016
  • In this paper, we propose a new technique to the design and real-time control of an adaptive controller for robotic manipulator based on digital signal processors. The Texas Instruments DSPs(TMS320C80) chips are used in implementing real-time adaptive control algorithms to provide enhanced motion control performance for dual-arm robotic manipulators. In the proposed scheme, adaptation laws are derived from model reference adaptive control principle based on the improved Lyapunov second method. The proposed adaptive controller consists of an adaptive feed-forward and feedback controller and time-varying auxiliary controller elements. The proposed control scheme is simple in structure, fast in computation, and suitable for real-time control. Moreover, this scheme does not require any accurate dynamic modeling, nor values of manipulator parameters and payload. Performance of the proposed adaptive controller is illustrated by simulation and experimental results for a dual arm robot manipulator with eight joints. joint space and cartesian space.

A Design of a Flash Memory Swapping File System using LFM (LFM 기법을 이용한 플래시 메모리 스와핑 파일 시스템 설계)

  • Han, Dae-Man;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.47-58
    • /
    • 2005
  • There are two major type of flash memory products, namely, NAND-type and NOR-type flash memory. NOR-type flash memory is generally deployed as ROM BIOS code storage because if offers Byte I/O and fast read operation. However, NOR-type flash memory is more expensive than NAND-type flash memory in terms of the cost per byte ratio, and hence NAND type flash memory is more widely used as large data storage such as embedded Linux file systems. In this paper, we designed an efficient flash memory file system based an Embedded system and presented to make up for reduced to Swapping a weak System Performance to flash file system using NAND-type flash memory, then proposed Swapping algorithm insured to an Execution time. Based on Implementation and simulation studies, Then, We improved performance bases on NAND-type flash memory to the requirement of the embedded system.

  • PDF

Implementation of high performance parallel LU factorization program for multi-threads on GPGPUs (GPGPU의 멀티 쓰레드를 활용한 고성능 병렬 LU 분해 프로그램의 구현)

  • Shin, Bong-Hi;Kim, Young-Tae
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.131-137
    • /
    • 2011
  • GPUs were originally designed for graphic processing, and GPGPUs are general-purpose GPUs for numerical computation with high performance and low electric power. In this paper, we implemented the parallel LU factorization program for GPGPUs. In CUDA, which is computational environment for Nvidia GPGPUs, domains are divided into blocks, and multi-threads compute each sub-blocks Simultaneously. In LU factorization program, computation order should be artificially decided due to the data dependence. To resolve the data dependancy, we suggested a parallel LU program for GPGPUs, and also explained parallel reduction algorithm for partial pivoting of LU factorization. We finally present performance analysis to show efficiency of the parallel LU factorization program based on multi-threads on GPGPUs.

Implementation of Failure-Diagnostic Context-awareness Middleware for Support Highly Reliable USN Application Service (고신뢰성 USN 응용 서비스 지원을 위한 오작동 진단 상황인지 미들웨어 구현)

  • Lee, Yong-Woong;Kim, Se-Han;Son, Kyo-Hun;Lee, In-Hwan;Shin, Chang-Sun
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.1-16
    • /
    • 2011
  • In this paper, we proposed the Failure-Diagnostic Context-awareness Middleware (FDCM) for improving the reliability in the USN application service. The middleware diagnoses the failure occurred in sensors or facilities in the indoor USN application system. The new middleware suggested in this paper consists of DataManagement module, ContextProvider module, Contextlnterpreter module, ServiceProvider module and DataStorage module. By analysing the data obtained by the interaction between modules through the diagnostic algorithm, the FDCM determines the malfunction of sensors and equipment devices. Then we verified the performance of middleware by using simulation. As a result, the FDCM showed the high performance in the large systems that many of the sensors and devices are installed.

Fast Face Gender Recognition by Using Local Ternary Pattern and Extreme Learning Machine

  • Yang, Jucheng;Jiao, Yanbin;Xiong, Naixue;Park, DongSun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1705-1720
    • /
    • 2013
  • Human face gender recognition requires fast image processing with high accuracy. Existing face gender recognition methods used traditional local features and machine learning methods have shortcomings of low accuracy or slow speed. In this paper, a new framework for face gender recognition to reach fast face gender recognition is proposed, which is based on Local Ternary Pattern (LTP) and Extreme Learning Machine (ELM). LTP is a generalization of Local Binary Pattern (LBP) that is in the presence of monotonic illumination variations on a face image, and has high discriminative power for texture classification. It is also more discriminate and less sensitive to noise in uniform regions. On the other hand, ELM is a new learning algorithm for generalizing single hidden layer feed forward networks without tuning parameters. The main advantages of ELM are the less stringent optimization constraints, faster operations, easy implementation, and usually improved generalization performance. The experimental results on public databases show that, in comparisons with existing algorithms, the proposed method has higher precision and better generalization performance at extremely fast learning speed.

Automatic Detection of Left Ventricular Contour Using Hough Transform with Weighted Model from 2D Echocardiogram (가중모델 Hough 변환을 이용한 2D 심초음파도에서의 좌심실 윤곽선 자동 검출)

  • 김명남;조진호
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.325-332
    • /
    • 1994
  • In this paper, a method is proposed to detect the endocardial contour of the left ventricle using the Hough transform with a weighted model and edge information from the 2D echocardiogram. The implementation of this method is as follows: first, an approximate model detection algorithm was implemented in order to detect the approximate endocardium model and the model center, then we constructed a weighted model with the detected model. Next, we found automatically the cavity center of the left ventricle performing the Hough transform which used the weighted model, and then we detected the endocardial contour using weighted model and edge image.

  • PDF

Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography (고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현)

  • You, Yeonsoo;Lee, Samuel Sangkon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

Design and Implementation of an Authentication Method for Secure Distribution and Use of E-documents in Online Environment (온라인 환경에서의 전자문서 안전배포 및 이용을 위한 인증방법 설계 및 구현)

  • Kim, Yong
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.1
    • /
    • pp.75-98
    • /
    • 2008
  • With explosive growth in the area of the Internet and IT services, various types of e-documents are generated and circulated. An e-Document is a sort of electronic records which a organization performs works and goals. In this study, we propose a security algorithm for secure use and distribution of e-documents. Especially, the proposed method can be applied to generate digital signature which can guarantee authenticity, integrity, confidentiality of an e-document and authenticate authorized users. Also, we can get higher security level as using a smart card that provides highly storing capacity and security. We carried out an experiment to verify efficiency and security of the proposed method.

An Application of FRBR Model to KORMARC Records (KORMARC 레코드에 대한 FRBR 모델의 적용 실험 - 국립중앙도서관 서지레코드를 사례로 하여 -)

  • Rho, Jee-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.2
    • /
    • pp.291-312
    • /
    • 2008
  • This study intends to make a comprehensive investigation on an application of FRBR model to KORMARC records. To the end, issues associated with FRBR implementation are analyzed, and automatic algorithms to covert bibliographic records into FRBR model are examined thoroughly. On the basis of it. this study implemented four-level hierarchical bibliographic structure of FRBR model using existing KORMARC records. 161 sample records for an experiment were selected from Korea national library. The work chosen as sample records was "Hamlet." Results suggest that considerable difficulties would be encountered in the process of FRBRizing KORMARC records.

  • PDF